Abstract
AbstractIn the information age, network security has gradually become a potentially huge problem, especially in the medical field, it is essential to ensure the accuracy and safety of images, and patient information needs to be included with minimal change. Combined log-polar transform (LPT) and discrete cosine transform (DCT), a novel robust watermarking algorithm for medical images, is proposed. It realized the lossless embedding of patient information into medical images. In the process of feature extraction and watermark embedding, the proposed algorithm reflects the characteristics of LPT, scale invariance and rotation invariance, and retains the advantages of DCT's ability to resist conventional attacks and robustness. As it adopts zero-watermarking embedding technology, it solves the defects caused by the traditional watermark embedding technology to modify the original image data and guaranteed the quality of medical images. The good experimental results show the effectiveness of this algorithm.
Funder
Natural Science Foundation of China
Hainan Provincial Natural Science Foundation of China
Major Scientific Project of Zhejiang Lab
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference14 articles.
1. M. Begum, M.S. Uddin, Digital image watermarking techniques: a review. Information 11, 110 (2020)
2. N. Agarwal, A.K. Singh, P.K. Singh, Survey of robust and imperceptible watermarking. Multim. Tools Appl. 78, 8603–8633 (2019)
3. A.K. Singh, B. Kumar, M. Dave, A. Mohan, Robust and imperceptible spread-spectrum watermarking for telemedicine applications, in Proceedings of the National Academy of Sciences, India Section A: Physical Sciences (2015), pp. 1–7
4. V.M. Potdar, S. Han, E. Chang, A survey of digital image watermarking techniques, in Proceedings of IEEE International Conference on Industrial Informatics (2005), pp. 709–716
5. K. Alavi, F. Taher, H. Al-Ahmad, A new multi watermarking algorithm for medical images using DWT and hash functions, in International Conference on Innovations in Information Technology (IIT) (2015), pp. 230–234
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献